A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking
[article]
2021
arXiv
pre-print
However, the existing attack methods craft the perturbations for each video independently, which comes at a non-negligible computational cost. ...
Specifically, we attack a tracker by adding a universal imperceptible perturbation to the template image and adding a fake target, i.e., a small universal adversarial patch, into the search images adhering ...
ACKNOWLEDGMENTS The authors would like to thank the reviewers for their constructive comments and suggestions. ...
arXiv:2105.02480v3
fatcat:3so53oag6nhbtfeusiybagfla4
An Adaptive Secret Key-directed Cryptographic Scheme for Secure Transmission in Wireless Sensor Networks
[article]
2015
arXiv
pre-print
The proposed method encrypts the sensitive captured data of sensor nodes using various encryption procedures (bitxor operation, bits shuffling, and secret key based encryption) and then sends it to the ...
This paper presents an adaptive cryptographic scheme for secure transmission of various sensitive parameters, sensed by wireless sensors to the fusion center for further processing in WSNs such as military ...
network security in WSN Ø Localization of sensors based on images Ø Coverage of object view-angle using visual sensor networks Ø Object tracking using sensor image processing Ø Aggregation of images in ...
arXiv:1510.00226v1
fatcat:ydwocbg5sbe7ngqrnmwlfnidju
ReconViguRation: Reconfiguring Physical Keyboards in Virtual Reality
[article]
2019
arXiv
pre-print
Physical keyboards are common peripherals for personal computers and are efficient standard text entry devices. ...
This allows individual physical keys to be reconfigured to the same or different actions and visual output to be distributed in various ways across the VR representation of the keyboard. ...
[35] for hand tracking on physical keyboards. ...
arXiv:1907.08153v1
fatcat:xp22hsnpbjecncidbdcb64az7q
Enhancement Digital Forensic Approach for Inter-Frame Video Forgery Detection Using a Deep Learning Technique
2022
Iraqi Journal of Science
Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. ...
It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. ...
These attacks primarily affect the time sequence of the visual information collected by the system. Common attacks are frame insertion, frame deletion, frame duplication, frame shuffling [23] . ...
doi:10.24996/ijs.2022.63.6.34
fatcat:enyogot3izdpjfiuiam2oscvuy
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations
2021
Wireless personal communications
The efficiency of the proposed system is proved in terms of histogram analysis, adjacent pixels correlation analysis, contrast analysis, homogeneity analysis, energy analysis, NIST analysis, mean square ...
The experimental results show that the proposed cryptosystem is a lightweight approach that can achieve the desired security level for encrypting confidential image-based patients' information. ...
in track associated with a zig-zag motion. ...
doi:10.1007/s11277-021-08584-z
fatcat:r6elxupxlnapdmunh7l4bu42ti
Visual prototypes in the ventral stream are attuned to complexity and gaze behavior
2021
Nature Communications
This suggests the code for object recognition represents compressed features of behavioral relevance, an underexplored aspect of efficient coding. ...
AbstractEarly theories of efficient coding suggested the visual system could compress the world by learning to represent features where information was concentrated, such as contours. ...
Acknowledgements We thank Mary Burkemper for technical help collecting the data and Richard T. Born for comments on the manuscript. ...
doi:10.1038/s41467-021-27027-8
pmid:34795262
pmcid:PMC8602238
fatcat:bdwhku4ruzhgxna5alipg4yi7u
Event Encryption for Neuromorphic Vision Sensors: Framework, Algorithm, and Evaluation
2021
Sensors
In addition, an updating score has been designed for controlling the frequency of execution, which supports efficient encryption on different platforms. ...
We firstly analyze the possible security attacks to NVS, including grayscale image reconstruction and privacy-related classification. ...
Secondly, we have proposed and designed an efficient encryption framework for protecting NVS data against visualization and recognition attacks. ...
doi:10.3390/s21134320
pmid:34202626
pmcid:PMC8272045
fatcat:eutwbh2tmnaztne7l4gauryytq
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping
2020
Symmetry
For pixel encryption, Intertwining and Chebyshev maps were employed in confusion and diffusion processes, respectively. ...
Due to interrupted real-time continuous monitoring capabilities of state-of-the-art cameras, a vision-based system can be easily deployed for occupancy monitoring. ...
Acknowledgments: The author Sajjad Shaukat Jamal extend his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant ...
doi:10.3390/sym12030350
fatcat:qqdteh3eszbf3jef7xm7dr4qp4
Encrypting Image based on Chaotic Map algorithm
2021
International Journal of Engineering Research and Advanced Technology
map for shuffling the image pixels positions; also baker map is used to decomposed Image into four rectangles and shuffle them. ...
Also, the experimental results utilizing image database is showing the strength and efficiency of the suggested chaotic image encryption for different images. ...
There are various approaches for tracking objects: Motion-based tracking Recognition-based tracking 4. ...
doi:10.31695/ijerat.2021.3703
fatcat:mhovnj7hfbbuxn2in2hcffna6e
Video Forgery Detection: A Comprehensive Study of Inter and Intra Frame Forgery With Comparison of State-Of-Art
2023
International Journal on Recent and Innovation Trends in Computing and Communication
IV SUMMARY OF VIDEO FORGERY DETECTION TECHNIQUES LIKED TO DEEPFAKE AND PIXEL MOTION DETECTION [60] Object GMM Self Could not find Tracking long distance and object [61] Detection Object Tracking and Contrast ...
This author has introduced some common attacks where region splicing attack is registered as external objects are injected into existing frames. ...
doi:10.17762/ijritcc.v11i9.9130
fatcat:afnzgvwofvc4thjrr6xrnjvwsq
CAN ID Shuffling Technique(CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN
2019
IEEE Access
New vehicles have become increasingly targeted for cyber-attacks as their rate of digitalization is accelerated. ...
an attack. ...
They performed an experiment to track the location of a vehicle using the vulnerabilities of Android OS for vehicles.
B. ...
doi:10.1109/access.2019.2892961
fatcat:t6c675ffyvdplltffcwpeyx45e
Advances in adversarial attacks and defenses in computer vision: A survey
[article]
2021
arXiv
pre-print
However, it is now known that DL is vulnerable to adversarial attacks that can manipulate its predictions by introducing visually imperceptible perturbations in images and videos. ...
Besides a comprehensive literature review, the article also provides concise definitions of technical terminologies for non-experts in this domain. ...
Object detection and tracking Object detection and tracking are longstanding computer vision problems. ...
arXiv:2108.00401v2
fatcat:23gw74oj6bblnpbpeacpg3hq5y
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
2023
IEEE Security and Privacy
In this work, we present a device-centric analysis of security and privacy attacks and defenses on Extended Reality (XR) devices, highlighting the need for robust and privacy-aware security mechanisms. ...
ACKNOWLEDGMENTS We thank the anonymous reviewers and special issue editors for their helpful feedback and time. ...
Science Foundation (Awards: 2039606, 2219920), Cyber Florida, Microsoft, (ii) La Sapienza University of Rome within the Bando Ricerca 2020, project "Secure ANd PrivatE Information sharing (SAN-PEI)", and ...
doi:10.1109/msec.2023.3332004
fatcat:x6noadffebddfoiglljxqgndda
Secure, privacy-preserving and federated machine learning in medical imaging
2020
Nature Machine Intelligence
Passerat-Palmbach and the OpenMined project members for their support and critical appraisal, and B. Farkas for creating the article's illustration. ...
Tabular data can be easily shuffled, but the perturbation of images can have unpredictable effects, with research demonstrating this type of manipulation (for example, adversarial noise) both as an attack ...
tracking/audit trails using blockchains 48 ). ...
doi:10.1038/s42256-020-0186-1
fatcat:qpuygpf6ojcrlpqg6a5hbsdfyq
Event Encryption: Rethinking Privacy Exposure for Neuromorphic Imaging
[article]
2023
arXiv
pre-print
Our evaluations show that the encrypted events can effectively protect information from attacks of low-level visual reconstruction and high-level neuromorphic reasoning, and thus feature dependable privacy-preserving ...
The proposed solution gives impetus to the security of event data and paves the way to a highly encrypted technique for privacy-protective neuromorphic imaging. ...
for the scenarios involving sensitive biometrics, such as facial expression tracking [10] and gait recognition [11] . ...
arXiv:2306.03369v1
fatcat:233nedm6pbd5lpvaoq64fsofne
« Previous
Showing results 1 — 15 out of 2,906 results